{"vulnerability": "cve-2020-9289", "sightings": [{"uuid": "0eb04d58-fc48-4b6a-bc31-12a5e5e042d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9289", "type": "published-proof-of-concept", "source": "Telegram/rQMVu4dwJRh1-j8AkvL2ouV19FMmA1TDUkwtOokmEHAkfA", "content": "", "creation_timestamp": "2023-07-01T09:06:39.000000Z"}, {"uuid": "e82838e8-497c-494a-9a2d-fa69d68a1943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9289", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3103", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory \n\n\u200b\u200bNosey Parker\n\nA command-line program that finds secrets and sensitive information in textual data and Git history.\n\nhttps://github.com/praetorian-inc/noseyparker\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200b\ud83d\udee1 eBPFShield\n\nA high-performance security tool that utilizes eBPF and Python to provide real-time IP-Intelligence and DNS monitoring. \n\nhttps://github.com/sagarbhure/eBPFShield\n\n#cybersecurity #infosec\n\n\u200b\u200bNetSoc #OSINT\n\nTool focused on extracting information from an account in various Social Networks.\n\nhttps://github.com/XDeadHackerX/NetSoc_OSINT\n\n#cybersecurity #infosec\n\n\u200b\u200bcloudtoolkit\n\nCloud Penetration Testing Toolkit\n\nhttps://github.com/404tk/cloudtoolkit\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bTomcatBackdoorPoC\n\nTomcat backdoor based on CS blog.\n\nhttps://github.com/HackingLZ/TomcatBackdoorPoC\n\nDetails:\nhttps://bit.ly/437Myhb\n\n#infosec #pentesting #redteam\n\n\u200b\u200bNoMoreCookies\n\nBrowser Protector against various stealers, written in C# &amp; C/C++. Works by hooking NtCreateFile and prevent accessing browser files, in addition to prevent it's unhooking. compatible with various games and software.\n\nhttps://github.com/AdvDebug/NoMoreCookies\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-28252\n\nUnderstanding the cve-2022-37969 windows common log file system driver local privilege escalation.\n\nhttps://github.com/fortra/CVE-2023-28252\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-2982\n\nWordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) &lt;= 7.6.4 - Authentication Bypass.\n\nhttps://github.com/RandomRobbieBF/CVE-2023-2982\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-3338\n\nPracticing different Linux kernel exploitation techniques with my DECnet vulnerability and null page mapping enabled.\n\nhttps://github.com/TurtleARM/CVE-2023-3338\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2020-9289\n\nDecrypt reversible secrets encrypted using the default hardcoded key related to CVE-2020-9289 on FortiAnalyzer/FortiManager (the only difference with CVE-2019-6693 is the encryption routine).\n\nhttps://github.com/synacktiv/CVE-2020-9289\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bPDFator\n\nInfoSec project that consists of a Python script and a C application to generate an executable payload. The payload includes functionality to write and execute a PDF file and execute shellcode. Both the PDF file and shellcode are encrypted using XOR and decrypted at runtime.\n\nhttps://github.com/smokeme/PDFator\n\n#cybersecurity #infosec\n\n\u200b\u200bUscrapper \n\n#OSINT tool that allows users to extract various personal information from a website. It leverages web scraping techniques and regular expressions to extract email addresses, social media links, author names, geolocations, phone numbers, and usernames from both hyperlinked and non-hyperlinked sources on the webpage.\n\nhttps://github.com/z0m31en7/Uscrapper\n\n#cybersecurity #infosec\n\n\u200b\u200bGold Digger\n\nA simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist in rapidly searching files obtained during a penetration test.\n\nhttps://github.com/ustayready/golddigger\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bLinux-Exploit-Detection\n\nLinux-based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Rego/Sigma.\n\nhttps://github.com/Loginsoft-Research/Linux-Exploit-Detection\n\n#cybersecurity #infosec\n\n\u200b\u200bdynmx \n\nSignature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces.\n\nhttps://github.com/0x534a/dynmx\n\n#cybersecurity #infosec\n\n\u200b\u200bjsluice\n\nExtract URLs, paths, secrets, and other interesting bits from JavaScript.\n\nhttps://github.com/BishopFox/jsluice\n\n#infosec #pentesting #bugbounty\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-06T11:08:24.000000Z"}, {"uuid": "0e5aa55e-797f-472e-93c2-c3c17dd4e57c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9289", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/827", "content": "Decrypt FortiManager configuration secrets ( CVE-2020-9289 &amp; CVE-2019-6693 )\nRepo : https://github.com/synacktiv/CVE-2020-9289", "creation_timestamp": "2023-08-16T06:30:09.000000Z"}, {"uuid": "e678dff3-458e-4ef1-9827-080a30dcfd9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9289", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3780", "content": "\ud83d\udd10DATALEAKS:\n\n\ud83d\udcccSocial Security Administration USA (SSA.gov) Leak : https://www.system32.ink/2023/06/social-security-administration-usa.html\n\n\ud83d\udcccElectrical4all (electrical4all.co.uk) UK Data Leak : https://www.system32.ink/2023/06/electrical4all-electrical4allcouk-uk.html\n\n\ud83d\udcccAuraXR (Mexican 'extended reality' company) DATA Leak : https://www.system32.ink/2023/06/auraxr-mexican-extended-reality-company.html\n\n\ud83d\udcccQWERT SYSTEM (South Korean POS systems) Leak : https://www.system32.ink/2023/06/qwert-system-south-korean-pos-systems.html\n\n\ud83d\udcccTelstra MyRewards (Australian rewards/coupon service) Data Leak : https://www.system32.ink/2023/06/telstra-myrewards-australian.html\n\n\ud83d\udcccDoctorAki (Colombian health website) Data Leak : https://www.system32.ink/2023/06/doctoraki-colombian-health-website-data.html\n\n\ud83d\udcccNovaPay data leak : https://www.system32.ink/2023/06/novapay-data-leak.html\n\n\ud83d\udccc3S Castle Real Estate (3skalegayrimenkul.com.tr) Data Leak : https://www.system32.ink/2023/06/3s-castle-real-estate.html\n\n\ud83e\uddeeExploits: \n\n\ud83d\udcccCVE-2023-34843 POC Traggo/server : https://www.system32.ink/2023/06/cve-2023-34843-poc-traggoserver.html\n\n\ud83d\udcccCVE-2023-2982 Exploit WordPress Social Login and Register Plugin : https://www.system32.ink/2023/06/cve-2023-2982-exploit-wordpress-social.html\n\n\ud83d\udee0Tools:\n\n\ud83d\udcccATSCAN SCANNER - Advanced dork Search &amp; Mass Exploit Scanner : https://www.system32.ink/2023/06/atscan-scanner-advanced-dork-search.html\n\n\ud83d\udcccDecrypt FortiManager configuration secrets (CVE-2020-9289) : https://www.system32.ink/2023/06/decrypt-fortimanager-configuration.html\n\n\ud83d\udcccNoMoreCookies - Browser Protector against various Stealers : https://www.system32.ink/2023/06/nomorecookies-browser-protector-against.html\n\n\ud83d\udc00RAT:\n\n\ud83d\udcccEverspy v1.1 Rat : https://www.system32.ink/2023/06/everspy-v11-rat-cracked-download.html\n\n\ud83e\udee5SCAMPAGE:\n\n\ud83d\udcccBellco Credit Union Scampage : https://www.system32.ink/2023/06/bellco-credit-union-phishing-page.html", "creation_timestamp": "2023-06-30T15:51:30.000000Z"}, {"uuid": "4e811d54-c181-4c36-a39a-373513723ef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9289", "type": "published-proof-of-concept", "source": "Telegram/FQgTqgAsC1BzgFQ3QhqXo3ZwrqpxzvjIHl33wB4sG5coLAQ", "content": "", "creation_timestamp": "2023-07-15T04:02:00.000000Z"}]}